Categories
Cybersecurity

Defend yourself against Malware Job application mails

The chance is high that one of those mails in your Outlook inbox contains malware, but how can you identify a malicious mail that holds malware? Well in this post we are going to give advice on how to deal with documents and files that are being send to you by mail. The reason why […]

Categories
Cybersecurity

APT POTAO EXPRESS: Infected version TrueCrypt used for cyber spying

A Russian website has been sharing a malicious TrueCrypt application for several years and recently it was made public by ESET that the file which is offered via the Russian website is actually a Trojan horse which is being used for espionage. The website hxxp://truecryptrussia.ru (MALICIOUS) was forcing this malicious TrueCrypt version and once the […]

Categories
Hacking How to

Apple Released a Temporary Fix For Crashed IPhone

Apple released a temporary fix for iMessage issue which cause instantly crash Iphone and difficulties to access the messages app. A bug in Apple’s iOS allows anyone who sends an iPhone a specific series of unicode characters(a string of English ,Arabic&Japanese characters) cause the receiving iPhone immediately crash. How to get access to the Messages […]

Categories
Downloads

30 Malicious IP list and Block lists providers 2015

Stop and use this great Malicious IP lists to block unwanted traffic to your network and company. These lists are daily updated by the best security companies which keep track of malicious domains, IP addresses and more. The malicious IP list providers which have been listed provide FREE information about malicious IP’s and they also […]

Categories
Facebook

Deleting malicious applications from your Facebook profile

This post will guide you on how to remove malicious applications from your Facebook account. We have published this post for people which have been infected by malicious Facebook applications, the malicious Facebook applications often get installed via scams and hoaxes which are shared on Facebook and other social media networks. Malicious applications often leave […]